:::MenuOnline Registration Outpatient Services What's New Clinic Schedule Introduction Our Mission Organization Statistics
Privacy & Security Policy
LastUpdate:2019/11/14 上午 11:43:55
- Data Collection
Depending on the service being provided, all or part of the following user data may be collected from visitors:
- User Registration:
Some personal information, including name, ID number, date of birth, gender, user name, address, telephone, e-mail address, occupation and interests may be asked to be provided.
- Subscription of epaper and attendance of online events and questionnaires:
Name, ID number, telephone number, e-mail address and physical address may be asked to be provided.
- General browsing:
While the user is browsing the Web site, the server will automatically produce a log file. This file includes user’s IP address, duration of visit, browser version used, and records of browsing and clicking behavior. These data are analyzed to improve our service quality.
- Suggestions and opinions:
If a user writes to the Web site, or express an opinion to us via another channel, we will retain the communication and a record of its disposition.
- User Registration:
- Use of personal data
Under no circumstances will the Web site sell, barter, or rent any personal data to any organization or individual. Under the following conditions personal data may be used:
- Notification of activities and epaper.
- Internal medical administration.
- Conducting internal or academic analyses of the number of users, their interests and behavior. These studies may be shared with the third party but they are based on overall user data and no analysis will be performed on individual user data. If a user’s data will be shared with the third party, he/she will be informed in advance and choose to agree or not.
- Cookies policy:
- Information about pages viewed and time spent on-site is used to improve the quality of the Web site's offerings and service.
- The Web site has the responsibility to protect personal privacy unless under the following conditions:
- When a forensic body collects information through a legal process.
- When a user’s behavior on this site has violated our regulations.
- When the Web site, as a governmental Web site, wants to extend services to better effects.
- When the Web site intends to protect other users’ rights.
- A User’s Responsibilities
Please safeguard your username, password and personal data. Do not reveal any personal information, particularly passwords, to anyone. After using any of the Web site's member services, please remember to log out properly before leaving the Web site. If you share your information with another user, or use internet services on a public computer (such as in a public library, school computer lab or Internet cafe), please remember to close the browser window to prevent other users from reading your personal information and mail or accessing members-only areas.
- Modification of the Policy
- Questions and Suggestions
We aim at establishing a secure and reliable electronic environment based on the requirements of ISO/IEC 27001 : 2005 Information Security Management System, ISMS, so that our hospital can effectively manage various affairs related to information security.
- Continuously improving various operations related to Information Security Policy based on the principle of ISO/IEC 27001：2005 accreditation.
- To make sure that the operations of the hospital will not be interrupted by incidents of information security, and to safeguard the security, intactness, and availability of all assets.
- To make sure that medical records are vigorously protected.
- To make sure medical data bank and related application systems are executed correctly.
- To make sure that data management meets the needs of users, and the original codes of programs are stored and managed properly.
- Safeguarding the security of the computer room, web site and internet services.
- Areas Applicable
- Personnel, application software, equipment and web facilities are Included.
- The accreditation area covered by ISMS refers to our computer room.
Based on the “Establishment Main Points of Information Security Committee” to execute operations related to information security.
This policy will be modified when necessary.